为您索检到268条磁力链接,耗时1毫秒。
- 【影视】 [ WebToolTip.com ] Udemy - Essential Cybersecurity For Everyone - Stay Safe Online
-
收录时间:2025-03-13
文档个数:19
文档大小:2.1 GB
最近下载:2025-05-15
人气:516
磁力链接
~Get Your Files Here !/4 - Creating Strong Passwords and Enhancing Overall Security/9 - Password Security.mp4 250.4 MB
~Get Your Files Here !/11 - IoT Security/16 - Securing Smart Devices in the Digital Age.mp4 235.4 MB
~Get Your Files Here !/7 - Data Backup and Recovery Essentials/12 - Safeguarding Your Data Backup and Restoration.mp4 209.9 MB
~Get Your Files Here !/9 - Cybersecurity for Travelers/14 - Staying Secure While Traveling Online.mp4 191.8 MB
~Get Your Files Here !/6 - Email Security Essentials/11 - Protecting Your Email from Threats.mp4 175.4 MB
~Get Your Files Here !/10 - Social Media Security/15 - Protecting Your Privacy on Social Media.mp4 172.2 MB
~Get Your Files Here !/5 - Safe Internet Browsing/10 - Safe Internet Browsing.mp4 126.9 MB
~Get Your Files Here !/12 - Steps to Take After a Cybersecurity Breach/17 - What to Do After a Cybersecurity Breach.mp4 116.9 MB
~Get Your Files Here !/1 - Introduction Essential Cybersecurity for everyone stay safe online/1 - Introduction.mp4 107.3 MB
~Get Your Files Here !/2 - Understanding Cyber Threats/2 - Understanding Cyber threats.mp4 98.9 MB
~Get Your Files Here !/8 - Securing Your Online Accounts/13 - Best Practices for Protecting Online Accounts.mp4 94.5 MB
~Get Your Files Here !/3 - Protecting Personal Devices/3 - Introduction to protecting personal devices.mp4 76.2 MB
~Get Your Files Here !/3 - Protecting Personal Devices/6 - Keeping Software Operating Systems Updated Strengthening Your Digital Defense.mp4 58.9 MB
~Get Your Files Here !/3 - Protecting Personal Devices/4 - Securing Computers and Laptops.mp4 43.3 MB
~Get Your Files Here !/3 - Protecting Personal Devices/7 - Configuring Firewalls Securing Your Devices and Home Network.mp4 36.6 MB
~Get Your Files Here !/3 - Protecting Personal Devices/5 - Securing Smartphones and Laptops.mp4 30.1 MB
~Get Your Files Here !/3 - Protecting Personal Devices/8 - Ensuring Safe and Secure WiFi Connections.mp4 27.5 MB
Get Bonus Downloads Here.url 180 Bytes
~Get Your Files Here !/Bonus Resources.txt 70 Bytes
猜你喜欢:
Everyone
WebToolTip
Cybersecurity
Safe
Udemy
Online
Stay
com
Essential
- 【影视】 Theoretical Foundations of AI in Cybersecurity
-
收录时间:2024-07-08
文档个数:362
文档大小:6.1 GB
最近下载:2025-05-15
人气:11053
磁力链接
[TutsNode.org] - Theoretical Foundations of AI in Cybersecurity/3. Fundamental Theories of AI/7. Case Study Revolutionizing Cybersecurity with Natural Language Processing.mp4 57.4 MB
[TutsNode.org] - Theoretical Foundations of AI in Cybersecurity/7. Deep Learning for Cyber Defense/11. Case Study Unraveling the Challenges of Deploying Deep Learning Models.mp4 52.3 MB
[TutsNode.org] - Theoretical Foundations of AI in Cybersecurity/7. Deep Learning for Cyber Defense/3. Case Study Enhancing Cybersecurity with Neural Networks.mp4 49.2 MB
[TutsNode.org] - Theoretical Foundations of AI in Cybersecurity/13. AI in Vulnerability Management/9. Case Study AI-Driven Transformation in Vulnerability Management.mp4 48.5 MB
[TutsNode.org] - Theoretical Foundations of AI in Cybersecurity/4. Cybersecurity Fundamentals/4. Types of Cyber Threats.mp4 48.4 MB
[TutsNode.org] - Theoretical Foundations of AI in Cybersecurity/15. AI in Network Security/9. Case Study AI in Network Security.mp4 48.1 MB
[TutsNode.org] - Theoretical Foundations of AI in Cybersecurity/2. Introduction to Cybersecurity and AI/8. Key Concepts and Terminologies.mp4 47.1 MB
[TutsNode.org] - Theoretical Foundations of AI in Cybersecurity/10. AI for Intrusion Detection Systems (IDS)/7. Case Study Implementing AI-Based Intrusion Detection Systems.mp4 46.9 MB
[TutsNode.org] - Theoretical Foundations of AI in Cybersecurity/2. Introduction to Cybersecurity and AI/4. Overview of Cybersecurity.mp4 46.5 MB
[TutsNode.org] - Theoretical Foundations of AI in Cybersecurity/10. AI for Intrusion Detection Systems (IDS)/9. Case Study Enhancing Cybersecurity with AI-Powered Intrusion Detection Systems.mp4 46.2 MB
[TutsNode.org] - Theoretical Foundations of AI in Cybersecurity/4. Cybersecurity Fundamentals/11. Case Study Revamping Cybersecurity Strategy at TechNova.mp4 44.9 MB
[TutsNode.org] - Theoretical Foundations of AI in Cybersecurity/5. Intersection of AI and Cybersecurity/11. Case Study Integrating AI for Enhanced Cybersecurity.mp4 44.4 MB
[TutsNode.org] - Theoretical Foundations of AI in Cybersecurity/7. Deep Learning for Cyber Defense/2. Neural Networks in Cybersecurity.mp4 44.2 MB
[TutsNode.org] - Theoretical Foundations of AI in Cybersecurity/11. AI for Threat Hunting/8. Case Studies and Examples.mp4 43.8 MB
[TutsNode.org] - Theoretical Foundations of AI in Cybersecurity/8. Natural Language Processing in Cybersecurity/3. Case Study Enhancing Cybersecurity Threat Intelligence.mp4 43.7 MB
[TutsNode.org] - Theoretical Foundations of AI in Cybersecurity/6. Machine Learning in Cybersecurity/2. Supervised Learning for Threat Detection.mp4 43.5 MB
[TutsNode.org] - Theoretical Foundations of AI in Cybersecurity/8. Natural Language Processing in Cybersecurity/11. Case Study Overcoming NLP Limitations in Cybersecurity.mp4 43.5 MB
[TutsNode.org] - Theoretical Foundations of AI in Cybersecurity/14. AI and Cyber Threat Intelligence/6. Theoretical Models and Techniques.mp4 43.4 MB
[TutsNode.org] - Theoretical Foundations of AI in Cybersecurity/9. Reinforcement Learning in Cyber Defense/5. Case Study Revolutionizing Cybersecurity with Reinforcement Learning.mp4 43.2 MB
[TutsNode.org] - Theoretical Foundations of AI in Cybersecurity/2. Introduction to Cybersecurity and AI/7. Case Study AI in Cybersecurity.mp4 42.9 MB
猜你喜欢:
AI
Foundations
Theoretical
Cybersecurity
- 【影视】 [ DevCourseWeb.com ] Udemy - Intro To Cybersecurity In Healthcare (2 Of 2),Plain and Simple
-
收录时间:2024-02-03
文档个数:26
文档大小:953.6 MB
最近下载:2025-05-15
人气:1322
磁力链接
~Get Your Files Here !/3 - Ransomware and Cryptocurrency.mp4 309.9 MB
~Get Your Files Here !/7 - Testing Your Vulnerabilities.mp4 150.2 MB
~Get Your Files Here !/2 - Malware.mp4 136.5 MB
~Get Your Files Here !/5 - Boston Childrens Hack The Response.mp4 123.0 MB
~Get Your Files Here !/8 - HIPAA.mp4 70.3 MB
~Get Your Files Here !/4 - Boston Childrens Hack The Issue.mp4 52.4 MB
~Get Your Files Here !/6 - Boston Childrens Hack Lessons Learned.mp4 50.7 MB
~Get Your Files Here !/1 - Introduction.mp4 49.6 MB
~Get Your Files Here !/9 - Conclusions.mp4 10.9 MB
~Get Your Files Here !/3 - Ransomware and Cryptocurrency English.vtt 24.5 kB
~Get Your Files Here !/7 - Testing Your Vulnerabilities English.vtt 12.5 kB
~Get Your Files Here !/13 - IN THE NEWS Some Straight Talk on Ransomware in Health Care.html 11.3 kB
~Get Your Files Here !/2 - Malware English.vtt 10.7 kB
~Get Your Files Here !/5 - Boston Childrens Hack The Response English.vtt 10.1 kB
~Get Your Files Here !/8 - HIPAA English.vtt 5.9 kB
~Get Your Files Here !/12 - IN THE NEWS.html 5.8 kB
~Get Your Files Here !/6 - Boston Childrens Hack Lessons Learned English.vtt 4.6 kB
~Get Your Files Here !/1 - Introduction English.vtt 4.5 kB
~Get Your Files Here !/4 - Boston Childrens Hack The Issue English.vtt 4.3 kB
~Get Your Files Here !/10 - IN THE NEWS Cyberattacks hit midsize hospitals hardest.html 4.2 kB
猜你喜欢:
Cybersecurity
Plain
Udemy
DevCourseWeb
Simple
Intro
Healthcare
com
- 【影视】 Lynda - Practical Cybersecurity
-
收录时间:2017-02-10
文档个数:45
文档大小:244.8 MB
最近下载:2025-05-15
人气:1388
磁力链接
8. Monitoring Network Activity/164982_08_03_XR15_packets.mp4 13.1 MB
7. Checking for Common Mistakes in Web Apps/164982_07_02_XR15_scan.mp4 11.9 MB
3. Personal Firewalls/164982_03_02_XR15_mswf.mp4 10.7 MB
3. Personal Firewalls/164982_03_06_XR15_iptables.mp4 9.8 MB
3. Personal Firewalls/164982_03_04_XR15_advrules.mp4 9.5 MB
7. Checking for Common Mistakes in Web Apps/164982_07_01_XR15_intro.mp4 9.4 MB
6. Checking Hosts for Known Vulnerabilities/164982_06_04_XR15_scan.mp4 8.6 MB
1. Why Cybersecurity/164982_01_03_XR15_attack.mp4 8.6 MB
1. Why Cybersecurity/164982_01_01_XR15_cyber.mp4 8.4 MB
8. Monitoring Network Activity/164982_08_05_XR151_intruder.mp4 8.3 MB
8. Monitoring Network Activity/164982_08_04_XR15_filters.mp4 8.2 MB
2. Antivirus/164982_02_06_XR15_schedule.mp4 8.2 MB
3. Personal Firewalls/164982_03_03_XR15_advfw.mp4 7.9 MB
0. Introduction/164982_00_01_WX30_welcome.mp4 6.9 MB
3. Personal Firewalls/164982_03_05_XR15_zedlan.mp4 6.7 MB
4. Knowing What Is on Your Network/164982_04_05_XR15_zenmap.mp4 6.3 MB
5. Network Communications and Detecting Intruders/164982_05_04_XR15_honeypot.mp4 6.0 MB
5. Network Communications and Detecting Intruders/164982_05_02_XR15_filexfer.mp4 5.8 MB
8. Monitoring Network Activity/164982_08_02_XR15_capture.mp4 5.6 MB
2. Antivirus/164982_02_05_XR15_avsettings.mp4 5.5 MB
猜你喜欢:
Practical
Lynda
Cybersecurity
- 【影视】 Cybersecurity {AM}
-
收录时间:2017-02-11
文档个数:39
文档大小:230.5 MB
最近下载:2025-05-15
人气:1804
磁力链接
0 Introduction/369625_00_03_XR15_Reference.mp4 10.2 MB
3 Architecting Security/369625_03_05_XR15_Cloud_Attribute_Taxonomy.mp4 10.1 MB
3 Architecting Security/369625_03_01_XR15_Introduction_to_SABSA.mp4 9.9 MB
2 Cloud Security Guidance/369625_02_16_SO30_XR30_Solution.mp4 9.9 MB
2 Cloud Security Guidance/369625_02_03_XR15_Information_Management.mp4 9.8 MB
1 Cloud Fundamentals/369625_01_01_XR15_Essential_Characteristics.mp4 9.6 MB
1 Cloud Fundamentals/369625_01_06_XR15_Cloud_Incidents.mp4 9.4 MB
2 Cloud Security Guidance/369625_02_02_XR15_Legal_Compliance_and_Audit.mp4 8.9 MB
1 Cloud Fundamentals/369625_01_09_XR15_Cloud_Trust.mp4 8.8 MB
2 Cloud Security Guidance/369625_02_07_XR15_Incident_Response.mp4 8.8 MB
2 Cloud Security Guidance/369625_02_11_XR15_Identity_in_the_Cloud.mp4 8.4 MB
2 Cloud Security Guidance/369625_02_08_XR15_Application_Security.mp4 8.3 MB
2 Cloud Security Guidance/369625_02_13_XR15_Virtualisation.mp4 8.2 MB
2 Cloud Security Guidance/369625_02_05_XR15_Traditional_Security_BCP_and_DR.mp4 8.2 MB
2 Cloud Security Guidance/369625_02_12_XR15_Cloud_Access_Control.mp4 7.9 MB
1 Cloud Fundamentals/369625_01_02_XR15_Infrastructure_as_a_Service.mp4 7.6 MB
3 Architecting Security/369625_03_02_XR15_Fast_Tracker.mp4 7.4 MB
1 Cloud Fundamentals/369625_01_05_XR151_Deployment_Models.mp4 6.7 MB
2 Cloud Security Guidance/369625_02_10_XR15_Encryption_and_Key_Management.mp4 6.6 MB
3 Architecting Security/369625_03_03_XR15_SABSA_Attributes.mp4 6.3 MB
猜你喜欢:
Cybersecurity
AM
- 【音乐】 TTC - Thinking about Cybersecurity
-
收录时间:2021-03-26
文档个数:19
文档大小:353.5 MB
最近下载:2025-05-15
人气:3035
磁力链接
TGC_9523_Lect18_Cybersecurity.mp3 21.3 MB
TGC_9523_Lect10_Cybersecurity.mp3 20.8 MB
TGC_9523_Lect14_Cybersecurity.mp3 20.6 MB
TGC_9523_Lect08_Cybersecurity.mp3 19.8 MB
TGC_9523_Lect05_Cybersecurity.mp3 19.8 MB
TGC_9523_Lect13_Cybersecurity.mp3 19.7 MB
TGC_9523_Lect11_Cybersecurity.mp3 19.5 MB
TGC_9523_Lect17_Cybersecurity.mp3 19.5 MB
TGC_9523_Lect01_Cybersecurity.mp3 19.5 MB
TGC_9523_Lect04_Cybersecurity.mp3 19.3 MB
TGC_9523_Lect09_Cybersecurity.mp3 19.1 MB
TGC_9523_Lect12_Cybersecurity.mp3 18.9 MB
TGC_9523_Lect15_Cybersecurity.mp3 18.9 MB
TGC_9523_Lect16_Cybersecurity.mp3 18.8 MB
TGC_9523_Lect06_Cybersecurity.mp3 18.7 MB
TGC_9523_Lect07_Cybersecurity.mp3 18.7 MB
TGC_9523_Lect02_Cybersecurity.mp3 18.2 MB
TGC_9523_Lect03_Cybersecurity.mp3 17.9 MB
DG9523_98F12.PDF 4.7 MB
猜你喜欢:
TTC
Thinking
about
Cybersecurity
- 【影视】 [ FreeCourseWeb.com ] Udemy - Cybersecurity Habits Masterclass
-
收录时间:2022-04-10
文档个数:93
文档大小:2.1 GB
最近下载:2025-05-15
人气:1566
磁力链接
~Get Your Files Here !/3. Skepticism/4. Slow Down And Frown.mp4 73.5 MB
~Get Your Files Here !/11. Conclusion/1. Well Awareiors.mp4 71.5 MB
~Get Your Files Here !/1. Introduction/1. Introduction.mp4 67.0 MB
~Get Your Files Here !/4. Vigilance/2. The Only Thing We Have To Fear.mp4 66.7 MB
~Get Your Files Here !/4. Vigilance/1. The Face Of The Enemy.mp4 66.5 MB
~Get Your Files Here !/5. Secrecy/2. Making It Personal.mp4 65.7 MB
~Get Your Files Here !/2. Literacy/5. Habits And Recipes.mp4 64.7 MB
~Get Your Files Here !/3. Skepticism/1. Zero Trust.mp4 64.5 MB
~Get Your Files Here !/8. Community/4. Habits And Recipes.mp4 57.4 MB
~Get Your Files Here !/8. Community/1. United We Stand.mp4 54.0 MB
~Get Your Files Here !/7. Diligence/3. Random Acts of Security.mp4 53.4 MB
~Get Your Files Here !/7. Diligence/2. Journaling.mp4 53.4 MB
~Get Your Files Here !/9. Mirroring/5. Habits And Recipes.mp4 52.0 MB
~Get Your Files Here !/6. Culture/1. Culture Eats Cybersecurity For Breakfast.mp4 51.4 MB
~Get Your Files Here !/10. Deception/1. Know Thy Enemy.mp4 49.4 MB
~Get Your Files Here !/9. Mirroring/3. Blindspots.mp4 49.1 MB
~Get Your Files Here !/3. Skepticism/2. The Pygmailion Effect.mp4 48.9 MB
~Get Your Files Here !/6. Culture/5. Habits And Recipes.mp4 48.0 MB
~Get Your Files Here !/2. Literacy/1. Fearless Learning.mp4 47.9 MB
~Get Your Files Here !/6. Culture/2. The Hermit Crab Shell.mp4 46.7 MB
猜你喜欢:
Cybersecurity
Masterclass
Udemy
Habits
FreeCourseWeb
com
- 【影视】 [TutorialPace.com] Lynda - Cybersecurity with Cloud Computing - [TP]
-
收录时间:2022-02-20
文档个数:38
文档大小:371.6 MB
最近下载:2025-05-15
人气:2055
磁力链接
00. Introduction/00_01 - Welcome.mp4 17.4 MB
00. Introduction/00_03 - Reference sites.mp4 16.6 MB
01. Cloud Fundamentals/01_01 - Defining the essential characteristics of cloud.mp4 15.8 MB
02. Cloud Security Guidance/02_03 - Managing information and data security.mp4 15.6 MB
03. Architecting Security/03_05 - Introducing cloud attribute taxonomy.mp4 15.5 MB
03. Architecting Security/03_01 - Introducing SABSA.mp4 15.3 MB
01. Cloud Fundamentals/01_06 - Identifying cloud incidents.mp4 15.2 MB
01. Cloud Fundamentals/01_09 - Defining trust models for cloud.mp4 14.0 MB
02. Cloud Security Guidance/02_16 - Solution Cloud security knowledge.mp4 13.8 MB
02. Cloud Security Guidance/02_02 - Complying with legal and audit requrements.mp4 13.1 MB
02. Cloud Security Guidance/02_11 - Verifying identity in the cloud.mp4 13.1 MB
02. Cloud Security Guidance/02_07 - Managing incident response.mp4 12.9 MB
02. Cloud Security Guidance/02_13 - Implementing virtualization.mp4 12.9 MB
02. Cloud Security Guidance/02_12 - Controlling cloud access.mp4 12.5 MB
02. Cloud Security Guidance/02_08 - Maximizing application security.mp4 12.3 MB
03. Architecting Security/03_02 - Using Fast Tracker.mp4 12.0 MB
02. Cloud Security Guidance/02_05 - Comparing traditional IT, BCP, and DR.mp4 12.0 MB
01. Cloud Fundamentals/01_02 - Understanding infrastructure as a service.mp4 11.9 MB
01. Cloud Fundamentals/01_05 - Discovering deployment models.mp4 11.4 MB
02. Cloud Security Guidance/02_10 - Managing encryption and keys.mp4 10.8 MB
猜你喜欢:
Computing
Cybersecurity
Lynda
TP
TutorialPace
com
Cloud
- 【其他】 Cybersecurity Essentials.m4b
-
收录时间:2018-11-14
文档个数:1
文档大小:498.9 MB
最近下载:2025-05-15
人气:3564
磁力链接
Cybersecurity Essentials.m4b 498.9 MB
猜你喜欢:
Cybersecurity
m4b
Essentials
- 【影视】 Microsoft Certified Cybersecurity Architect Expert - SC-100 - Microsoft Certification Training
-
收录时间:2024-07-04
文档个数:135
文档大小:2.5 GB
最近下载:2025-05-15
人气:946
磁力链接
[TutsNode.net] - Microsoft Certified Cybersecurity Architect Expert - SC-100 - Microsoft Certification Training/2. Translating Security Requirements/6. Azure Security Benchmark - Microsoft Certified Cybersecurity-1.mp4 113.5 MB
[TutsNode.net] - Microsoft Certified Cybersecurity Architect Expert - SC-100 - Microsoft Certification Training/3. Designing Security Strategies/2. Hybrid Environmental Security Strategies - Microsoft Certifi.mp4 63.8 MB
[TutsNode.net] - Microsoft Certified Cybersecurity Architect Expert - SC-100 - Microsoft Certification Training/10. Design a security strategy for data and applications/1. Specify Priorities for Mitigating Threats to Apps - Microsof-1.mp4 62.3 MB
[TutsNode.net] - Microsoft Certified Cybersecurity Architect Expert - SC-100 - Microsoft Certification Training/6. Designing a Regulatory Compliance Strategy/4. Implementing Azure Policy - Microsoft Certified Cybersecurit.mp4 59.0 MB
[TutsNode.net] - Microsoft Certified Cybersecurity Architect Expert - SC-100 - Microsoft Certification Training/7. Evaluating and Managing Security Postures/6. Mitigating Identified Risks - Microsoft Certified Cybersecur-1.mp4 53.6 MB
[TutsNode.net] - Microsoft Certified Cybersecurity Architect Expert - SC-100 - Microsoft Certification Training/3. Designing Security Strategies/4. Traffic Filtering and Segmentation Strategies - Microsoft Ce-1.mp4 53.4 MB
[TutsNode.net] - Microsoft Certified Cybersecurity Architect Expert - SC-100 - Microsoft Certification Training/10. Design a security strategy for data and applications/4. Priorities For Mitigating Threats To Data - Microsoft Certif-1.mp4 53.4 MB
[TutsNode.net] - Microsoft Certified Cybersecurity Architect Expert - SC-100 - Microsoft Certification Training/3. Designing Security Strategies/5. Azure Best Practices for Network Security - Microsoft Certif-1.mp4 52.2 MB
[TutsNode.net] - Microsoft Certified Cybersecurity Architect Expert - SC-100 - Microsoft Certification Training/1. Examining the Microsoft Cybersecurity Reference Architecture (MCRA)/5. Hybrid Infrastructure - Microsoft Certified Cybersecurity Ar-1.mp4 50.4 MB
[TutsNode.net] - Microsoft Certified Cybersecurity Architect Expert - SC-100 - Microsoft Certification Training/6. Designing a Regulatory Compliance Strategy/6. Translating Privacy Requirements - Microsoft Certified Cyber.mp4 49.7 MB
[TutsNode.net] - Microsoft Certified Cybersecurity Architect Expert - SC-100 - Microsoft Certification Training/9. Designing a Strategy for Securing SaaS, PaaS, and IaaS Services/1. Security Baselines for SaaS, PaaS, and IaaS services - Micro.mp4 48.3 MB
[TutsNode.net] - Microsoft Certified Cybersecurity Architect Expert - SC-100 - Microsoft Certification Training/2. Translating Security Requirements/3. Translating Business Goals into Security Requirements - Micr.mp4 47.9 MB
[TutsNode.net] - Microsoft Certified Cybersecurity Architect Expert - SC-100 - Microsoft Certification Training/2. Translating Security Requirements/7. Securing Privileged Access Using RaMP - Microsoft Certified -1.mp4 47.8 MB
[TutsNode.net] - Microsoft Certified Cybersecurity Architect Expert - SC-100 - Microsoft Certification Training/1. Examining the Microsoft Cybersecurity Reference Architecture (MCRA)/2. Security Operations - Microsoft Certified Cybersecurity Arch-1.mp4 47.0 MB
[TutsNode.net] - Microsoft Certified Cybersecurity Architect Expert - SC-100 - Microsoft Certification Training/4. Designing a Security Operations Strategy/5. SIEMSOAR Strategy - Microsoft Certified Cybersecurity Archit.mp4 46.3 MB
[TutsNode.net] - Microsoft Certified Cybersecurity Architect Expert - SC-100 - Microsoft Certification Training/2. Translating Security Requirements/2. Translating Requirements - Microsoft Certified Cybersecurity.mp4 46.2 MB
[TutsNode.net] - Microsoft Certified Cybersecurity Architect Expert - SC-100 - Microsoft Certification Training/10. Design a security strategy for data and applications/3. Security Strategy for Applications and APIs - Microsoft Cert-1.mp4 44.6 MB
[TutsNode.net] - Microsoft Certified Cybersecurity Architect Expert - SC-100 - Microsoft Certification Training/5. Designing an Identity Security Strategy/1. Strategy for Access to Cloud Resources - Microsoft Certified.mp4 43.0 MB
[TutsNode.net] - Microsoft Certified Cybersecurity Architect Expert - SC-100 - Microsoft Certification Training/7. Evaluating and Managing Security Postures/4. Designing Security for an Azure Landing Zone - Microsoft Cer.mp4 42.8 MB
[TutsNode.net] - Microsoft Certified Cybersecurity Architect Expert - SC-100 - Microsoft Certification Training/4. Designing a Security Operations Strategy/3. Logging and Auditing Strategy - Microsoft Certified Cybersec.mp4 42.3 MB
猜你喜欢:
Microsoft
Training
Expert
Certification
Cybersecurity
Architect
SC
100
Certified
- 【文档书籍】 Cybersecurity presented by Wiley
-
收录时间:2017-08-06
文档个数:438
文档大小:1.5 GB
最近下载:2025-05-15
人气:1540
磁力链接
pdf/applied_cryptography_protocols_algorithms_and_source_code_in_c.pdf 164.8 MB
Malware Analyst's Cookbook DVD/9780470613030/8/7/8-7.mov 131.8 MB
Malware Analyst's Cookbook DVD/9780470613030/16/8/16-8.mov 93.9 MB
Malware Analyst's Cookbook DVD/9780470613030/6/9/6-9.mov 71.4 MB
Malware Analyst's Cookbook DVD/9780470613030/17/10/17-10.mov 70.3 MB
Malware Analyst's Cookbook DVD/9780470613030/6/11/6-11.mov 64.0 MB
Malware Analyst's Cookbook DVD/9780470613030/8/1/8-1.mov 59.6 MB
Malware Analyst's Cookbook DVD/9780470613030/13/4/13-4.mov 55.4 MB
Malware Analyst's Cookbook DVD/9780470613030/15/6/prolaco.vmem.zip 45.3 MB
Malware Analyst's Cookbook DVD/9780470613030/16/7/laqma.vmem.zip 44.5 MB
Malware Analyst's Cookbook DVD/9780470613030/16/6/coreflood.vmem.zip 44.4 MB
Malware Analyst's Cookbook DVD/9780470613030/17/1/zeus.vmem.zip 43.5 MB
Malware Analyst's Cookbook DVD/9780470613030/16/6/silentbanker.vmem.zip 43.5 MB
Malware Analyst's Cookbook DVD/9780470613030/17/6/be2.vmem.zip 42.8 MB
Malware Analyst's Cookbook DVD/9780470613030/17/11/sality.vmem.zip 42.8 MB
Malware Analyst's Cookbook DVD/9780470613030/17/8/tigger.vmem.zip 42.1 MB
pdf/ceh_v9_certified_ethical_hacker_study_guide.pdf 38.9 MB
Malware Analyst's Cookbook DVD/9780470613030/9/5/9-5.mov 30.5 MB
Malware Analyst's Cookbook DVD/9780470613030/6/1/6-1.mov 30.3 MB
pdf/unauthorised_access_physical_penetration_testing_for_it_security_teams.pdf 27.2 MB
猜你喜欢:
Cybersecurity
Wiley
presented
- 【影视】 [ TutSala.com ] Linkedin - Crisis Communication Planning After a Ransomware or Other Cybersecurity Attack
-
收录时间:2023-12-17
文档个数:23
文档大小:83.2 MB
最近下载:2025-05-15
人气:459
磁力链接
~Get Your Files Here !/03 - 2. The Cyberattack Crisis Communications Phases/02 - Prepare your team to address a crisis.mp4 14.0 MB
~Get Your Files Here !/02 - 1. The Impact of Cyberattacks/02 - Determining who is on your team when a cyberattack occurs.mp4 11.4 MB
~Get Your Files Here !/02 - 1. The Impact of Cyberattacks/01 - Why cyberattacks impact every organization.mp4 11.1 MB
~Get Your Files Here !/03 - 2. The Cyberattack Crisis Communications Phases/01 - What to say and to whom at onset.mp4 10.7 MB
~Get Your Files Here !/04 - 3. Evaluate and Train/01 - Continue to evaluate after a training.mp4 9.1 MB
~Get Your Files Here !/03 - 2. The Cyberattack Crisis Communications Phases/04 - What to tell people after the attack.mp4 7.4 MB
~Get Your Files Here !/04 - 3. Evaluate and Train/02 - Design crisis scenario-based training for higher retention.mp4 6.8 MB
~Get Your Files Here !/03 - 2. The Cyberattack Crisis Communications Phases/03 - Practice to improve crisis communications.mp4 5.3 MB
~Get Your Files Here !/01 - Introduction/01 - Anyone can suffer a ransomware or other cyberattack.mp4 5.0 MB
~Get Your Files Here !/05 - Conclusion/01 - You can do this.mp4 2.3 MB
~Get Your Files Here !/Ex_Files_Crisis_Communication_Planning_Cybersecurity/Exercise Files/Questions to Ask Your Team.pdf 31.1 kB
~Get Your Files Here !/03 - 2. The Cyberattack Crisis Communications Phases/02 - Prepare your team to address a crisis.srt 10.6 kB
~Get Your Files Here !/03 - 2. The Cyberattack Crisis Communications Phases/01 - What to say and to whom at onset.srt 8.6 kB
~Get Your Files Here !/02 - 1. The Impact of Cyberattacks/02 - Determining who is on your team when a cyberattack occurs.srt 7.3 kB
~Get Your Files Here !/02 - 1. The Impact of Cyberattacks/01 - Why cyberattacks impact every organization.srt 7.0 kB
~Get Your Files Here !/04 - 3. Evaluate and Train/02 - Design crisis scenario-based training for higher retention.srt 6.3 kB
~Get Your Files Here !/03 - 2. The Cyberattack Crisis Communications Phases/04 - What to tell people after the attack.srt 5.5 kB
~Get Your Files Here !/04 - 3. Evaluate and Train/01 - Continue to evaluate after a training.srt 5.2 kB
~Get Your Files Here !/03 - 2. The Cyberattack Crisis Communications Phases/03 - Practice to improve crisis communications.srt 3.8 kB
~Get Your Files Here !/01 - Introduction/01 - Anyone can suffer a ransomware or other cyberattack.srt 2.5 kB
猜你喜欢:
Ransomware
Cybersecurity
Communication
After
Linkedin
TutSala
Attack
Planning
Other
com
- 【影视】 MS Cybersecurity Pro Track Enterprise Security Fundamentals
-
收录时间:2021-03-14
文档个数:91
文档大小:1.0 GB
最近下载:2025-05-15
人气:1875
磁力链接
[TutsNode.com] - MS Cybersecurity Pro Track Enterprise Security Fundamentals/02 Understanding the cybersecurity landscape/003 Current Cybersecurity Landscape.mp4 169.2 MB
[TutsNode.com] - MS Cybersecurity Pro Track Enterprise Security Fundamentals/03 Red Team_ Penetration, lateral movement, escalation, and exfiltration/008 Red Team Kill Chain.mp4 142.4 MB
[TutsNode.com] - MS Cybersecurity Pro Track Enterprise Security Fundamentals/04 Blue Team Detection, Investigation, Response and Mitigation/014 Attack Detection.mp4 89.9 MB
[TutsNode.com] - MS Cybersecurity Pro Track Enterprise Security Fundamentals/04 Blue Team Detection, Investigation, Response and Mitigation/011 Blue Team Kill Chain.mp4 70.3 MB
[TutsNode.com] - MS Cybersecurity Pro Track Enterprise Security Fundamentals/05 Beyond The Breach/016 Organization Preparations.mp4 68.5 MB
[TutsNode.com] - MS Cybersecurity Pro Track Enterprise Security Fundamentals/04 Blue Team Detection, Investigation, Response and Mitigation/012 Restrict Privilege Escalation.mp4 59.9 MB
[TutsNode.com] - MS Cybersecurity Pro Track Enterprise Security Fundamentals/02 Understanding the cybersecurity landscape/005 Cost of Breach.mp4 59.5 MB
[TutsNode.com] - MS Cybersecurity Pro Track Enterprise Security Fundamentals/03 Red Team_ Penetration, lateral movement, escalation, and exfiltration/007 The Attacker's Objective.mp4 55.8 MB
[TutsNode.com] - MS Cybersecurity Pro Track Enterprise Security Fundamentals/02 Understanding the cybersecurity landscape/004 Assume Compromise Philosophy.mp4 53.5 MB
[TutsNode.com] - MS Cybersecurity Pro Track Enterprise Security Fundamentals/05 Beyond The Breach/017 Developing and Maintaining Policies.mp4 50.7 MB
[TutsNode.com] - MS Cybersecurity Pro Track Enterprise Security Fundamentals/04 Blue Team Detection, Investigation, Response and Mitigation/013 Restrict Lateral Movement.mp4 43.0 MB
[TutsNode.com] - MS Cybersecurity Pro Track Enterprise Security Fundamentals/05 Beyond The Breach/015 CIA Triad.mp4 30.7 MB
[TutsNode.com] - MS Cybersecurity Pro Track Enterprise Security Fundamentals/03 Red Team_ Penetration, lateral movement, escalation, and exfiltration/006 Red Team versus Blue Team exercises.mp4 30.4 MB
[TutsNode.com] - MS Cybersecurity Pro Track Enterprise Security Fundamentals/01 Introduction/002 Course overview.mp4 25.3 MB
[TutsNode.com] - MS Cybersecurity Pro Track Enterprise Security Fundamentals/04 Blue Team Detection, Investigation, Response and Mitigation/010 Blue Team.mp4 22.9 MB
[TutsNode.com] - MS Cybersecurity Pro Track Enterprise Security Fundamentals/03 Red Team_ Penetration, lateral movement, escalation, and exfiltration/009 Document Vulnerabilities.mp4 10.6 MB
[TutsNode.com] - MS Cybersecurity Pro Track Enterprise Security Fundamentals/01 Introduction/001 Instructor introduction.mp4 9.3 MB
[TutsNode.com] - MS Cybersecurity Pro Track Enterprise Security Fundamentals/07 Conclusion/018 Bonus Lecture_ What Next_.mp4 3.2 MB
[TutsNode.com] - MS Cybersecurity Pro Track Enterprise Security Fundamentals/04 Blue Team Detection, Investigation, Response and Mitigation/014 AttackDetection.pdf 709.3 kB
[TutsNode.com] - MS Cybersecurity Pro Track Enterprise Security Fundamentals/04 Blue Team Detection, Investigation, Response and Mitigation/011 BlueTeamKillChain.pdf 695.5 kB
猜你喜欢:
Fundamentals
Cybersecurity
Pro
Track
MS
Enterprise
Security
- 【影视】 AI-Enabled Programming, Networking, and Cybersecurity
-
收录时间:2024-11-28
文档个数:33
文档大小:690.1 MB
最近下载:2025-05-15
人气:1797
磁力链接
Lesson 2 Using AI for Cybersecurity/004. 2.3 Securing AI Implementations.mp4 66.1 MB
Lesson 1 Introduction to AI-powered Tools/007. 1.6 Introducing Embedding Models.mp4 41.5 MB
Lesson 1 Introduction to AI-powered Tools/006. 1.5 Introducing Retrieval Augmented Generation (RAG).mp4 39.5 MB
Lesson 2 Using AI for Cybersecurity/005. 2.4 Exploring Network Security Processes Incorporating AI Tools.mp4 33.3 MB
Lesson 1 Introduction to AI-powered Tools/003. 1.2 Large Language Models (LLMs) and Small Language Models (SLMs).mp4 31.4 MB
Lesson 3 Using AI for Software Development/008. 3.7 Prompt Engineering for Software Development.mp4 31.0 MB
Lesson 1 Introduction to AI-powered Tools/004. 1.3 Introducing LangChain, LangGraph, Llama Index, and Other Orchestration Frameworks.mp4 28.4 MB
Lesson 4 Using AI for Networking/002. 4.1 Exploring how AI is Revolutionizing Networking.mp4 26.9 MB
Lesson 1 Introduction to AI-powered Tools/009. 1.8 Introducing Semantic Search.mp4 25.6 MB
Lesson 4 Using AI for Networking/003. 4.2 Using GitHub Copilot for Programming Tasks Related to Networking.mp4 23.8 MB
Lesson 4 Using AI for Networking/005. 4.4 Prompt Engineering for Networking.mp4 23.6 MB
Lesson 5 Future Trends and Additional Emerging Technologies/003. 5.2 Regulatory and Policy Frameworks.mp4 23.0 MB
Lesson 3 Using AI for Software Development/005. 3.4 Generating Code from a Prompt.mp4 22.0 MB
Introduction/001. AI-Enabled Programming, Networking, and Cybersecurity Introduction.mp4 21.4 MB
Lesson 1 Introduction to AI-powered Tools/001. Learning objectives.mp4 19.7 MB
Lesson 1 Introduction to AI-powered Tools/008. 1.7 Introducing Vector Databases - pgvector, Chroma, MongoDB Atlas Vector Search, and others.mp4 18.5 MB
Lesson 1 Introduction to AI-powered Tools/002. 1.1 Overview of the Evolution of AI-driven Tools.mp4 18.4 MB
Summary/001. AI-Enabled Programming, Networking, and Cybersecurity Summary.mp4 18.1 MB
Lesson 1 Introduction to AI-powered Tools/005. 1.4 An Overview of Open-source AI Models and Hugging Face.mp4 17.9 MB
Lesson 5 Future Trends and Additional Emerging Technologies/002. 5.1 Exploring Additional Applications of AI in Emerging Technologies.mp4 16.9 MB
猜你喜欢:
AI
Programming
Networking
Enabled
Cybersecurity
- 【影视】 [ FreeCourseWeb.com ] Udemy - Cybersecurity Solution Architecture 101
-
收录时间:2025-05-06
文档个数:15
文档大小:1.3 GB
最近下载:2025-05-15
人气:75
磁力链接
~Get Your Files Here !/2 -Fundamental Concepts & Terminology.mp4 157.1 MB
~Get Your Files Here !/6 -Endpoint & Device Security.mp4 123.5 MB
~Get Your Files Here !/5 -Identity & Access Management (IAM) Basics.mp4 111.4 MB
~Get Your Files Here !/12 -Security Operations & Incident Response Overview.mp4 104.7 MB
~Get Your Files Here !/7 -Infrastructure Vulnerability Management.mp4 99.1 MB
~Get Your Files Here !/13 -Wrap-Up & Preparation for 201 Course.mp4 97.2 MB
~Get Your Files Here !/10 -Secure Application Foundations.mp4 91.1 MB
~Get Your Files Here !/3 -The Threat Landscape.mp4 90.2 MB
~Get Your Files Here !/1 -Introduction to Cybersecurity & the Role of a Cybersecurity Solution Architect.mp4 86.2 MB
~Get Your Files Here !/8 -Introduction to Cryptography.mp4 85.8 MB
~Get Your Files Here !/9 -Cloud Security Essentials.mp4 83.0 MB
~Get Your Files Here !/11 -Basic Governance, Risk, & Compliance (GRC).mp4 74.4 MB
~Get Your Files Here !/4 -Networking & Network Security Fundamentals.mp4 70.6 MB
Get Bonus Downloads Here.url 183 Bytes
~Get Your Files Here !/Bonus Resources.txt 70 Bytes
猜你喜欢:
Cybersecurity
Solution
Udemy
FreeCourseWeb
Architecture
101
com
- 【其他】 Cybersecurity - Attack and Defense Strategies, 2nd Edition
-
收录时间:2021-05-03
文档个数:8
文档大小:248.7 MB
最近下载:2025-05-15
人气:1256
磁力链接
Book/Cybersecurity - Attack and Defense Strategies, 2nd Edition.mobi 141.0 MB
Book/Cybersecurity - Attack and Defense Strategies, 2nd Edition.epub 72.4 MB
Book/Cybersecurity - Attack and Defense Strategies, 2nd Edition.pdf 35.3 MB
[TGx]Downloaded from torrentgalaxy.to.txt 585 Bytes
Torrent Downloaded from Glodls.to.txt 237 Bytes
[Bookflare.org] - Visit for more books.txt 71 Bytes
Downloaded from Demonoid - www.dnoid.to.txt 56 Bytes
Bookflare.org.txt 52 Bytes
猜你喜欢:
Cybersecurity
2nd
Edition
Attack
Defense
Strategies
- 【文档书籍】 Cybersecurity Unlocked
-
收录时间:2024-04-07
文档个数:2
文档大小:95.2 MB
最近下载:2025-05-15
人气:1740
磁力链接
Cybersecurity Unlocked.pdf 95.2 MB
Readme.txt 682 Bytes
猜你喜欢:
Cybersecurity
Unlocked
- 【影视】 [ FreeCourseWeb.com ] Udemy - Master Cybersecurity,Ethical Hacking and Penetrating Testing (Updated 09 - 2021)
-
收录时间:2022-02-08
文档个数:66
文档大小:2.7 GB
最近下载:2025-05-15
人气:1511
磁力链接
~Get Your Files Here !/4. Exposing Hackers - Know Your Enemy/8. What is Phishing, Vishing and SMShing.mp4 247.1 MB
~Get Your Files Here !/4. Exposing Hackers - Know Your Enemy/2. Why You Need Security .mp4 189.8 MB
~Get Your Files Here !/4. Exposing Hackers - Know Your Enemy/4. Security Bugs and Vulnerabilities - The Vulnerability Landscape.mp4 180.0 MB
~Get Your Files Here !/4. Exposing Hackers - Know Your Enemy/7. Spyware, Adware, Scareware, PUPs & Browser hijacking.mp4 178.9 MB
~Get Your Files Here !/2. Introduction To Cybersecurity, Ethical Hacking And Penetrating Testing/11. Setting up Labs.mp4 169.5 MB
~Get Your Files Here !/4. Exposing Hackers - Know Your Enemy/9. Spamming & Doxing.mp4 168.1 MB
~Get Your Files Here !/4. Exposing Hackers - Know Your Enemy/10. Social Engineering - Scams, Cons, Tricks and Fraud.mp4 163.0 MB
~Get Your Files Here !/3. Exposing Hackers - Know Yourself/3. What is Privacy, Anonymity and Pseudonymity .mp4 158.8 MB
~Get Your Files Here !/3. Exposing Hackers - Know Yourself/6. Threat Modelling And Risk Assessment.mp4 158.3 MB
~Get Your Files Here !/4. Exposing Hackers - Know Your Enemy/6. Malware, Viruses, Root kits and RATs.mp4 152.7 MB
~Get Your Files Here !/4. Exposing Hackers - Know Your Enemy/5. Hackers, crackers and cyber criminals.mp4 146.5 MB
~Get Your Files Here !/3. Exposing Hackers - Know Yourself/8. Confidentiality, Integrity and Availability - (Security Attributes).mp4 141.8 MB
~Get Your Files Here !/3. Exposing Hackers - Know Yourself/4. Security, Vulnerabilities, Threats and Adversaries.mp4 117.8 MB
~Get Your Files Here !/3. Exposing Hackers - Know Yourself/2. Protect What You Value.mp4 93.7 MB
~Get Your Files Here !/3. Exposing Hackers - Know Yourself/10. Zero Trust Model.mp4 85.7 MB
~Get Your Files Here !/3. Exposing Hackers - Know Yourself/7. Security,Anonymity and Privacy.mp4 59.8 MB
~Get Your Files Here !/2. Introduction To Cybersecurity, Ethical Hacking And Penetrating Testing/1. What is Cybersecurity .mp4 34.8 MB
~Get Your Files Here !/3. Exposing Hackers - Know Yourself/9. Defence in Depth.mp4 34.2 MB
~Get Your Files Here !/2. Introduction To Cybersecurity, Ethical Hacking And Penetrating Testing/8. Who Conduct it .mp4 26.4 MB
~Get Your Files Here !/2. Introduction To Cybersecurity, Ethical Hacking And Penetrating Testing/5. Purpose of Studying Ethical Hacking and Penetrating Testing.mp4 24.3 MB
猜你喜欢:
Ethical
Penetrating
09
Cybersecurity
Testing
Updated
Udemy
Master
2021
FreeCourseWeb
- 【影视】 [ CourseWikia.com ] CompTIA Cybersecurity Analyst + (CySA + ) (CS0-003) - 2 Vulnerability Management
-
收录时间:2024-01-06
文档个数:172
文档大小:614.3 MB
最近下载:2025-05-15
人气:4833
磁力链接
~Get Your Files Here !/09 - 8. More Cybersecurity Tools/05 - Control frameworks.mp4 21.9 MB
~Get Your Files Here !/10 - 9. Software Development Lifecycle/02 - Development methodologies.mp4 18.1 MB
~Get Your Files Here !/12 - 11. Software Quality Assurance/03 - Fuzzing.mp4 16.9 MB
~Get Your Files Here !/07 - 6. Software Security Issues/16 - Interception proxies.mp4 13.7 MB
~Get Your Files Here !/06 - 5. Common Vulnerabilities/01 - Server vulnerabilities.mp4 13.0 MB
~Get Your Files Here !/09 - 8. More Cybersecurity Tools/02 - Cloud auditing tools.mp4 13.0 MB
~Get Your Files Here !/15 - 14. Risk Management/05 - Risk visibility and reporting.mp4 12.7 MB
~Get Your Files Here !/09 - 8. More Cybersecurity Tools/01 - Exploitation frameworks.mp4 12.3 MB
~Get Your Files Here !/08 - 7. Specialized Technology Vulnerabilities/01 - Industrial control systems.mp4 11.5 MB
~Get Your Files Here !/04 - 3. Configuring and Executing Vulnerability Scans/02 - Scan configuration.mp4 11.4 MB
~Get Your Files Here !/03 - 2. Network Mapping/02 - Install Nmap on Windows.mp4 11.0 MB
~Get Your Files Here !/07 - 6. Software Security Issues/01 - OWASP Top 10.mp4 10.9 MB
~Get Your Files Here !/15 - 14. Risk Management/02 - Quantitative risk assessment.mp4 10.7 MB
~Get Your Files Here !/08 - 7. Specialized Technology Vulnerabilities/03 - Embedded systems.mp4 10.6 MB
~Get Your Files Here !/02 - 1. Creating a Vulnerability Management Program/03 - Scan frequency.mp4 10.5 MB
~Get Your Files Here !/02 - 1. Creating a Vulnerability Management Program/02 - Identify scan targets.mp4 10.2 MB
~Get Your Files Here !/07 - 6. Software Security Issues/08 - Overflow attacks.mp4 9.9 MB
~Get Your Files Here !/07 - 6. Software Security Issues/10 - Session hijacking.mp4 9.6 MB
~Get Your Files Here !/15 - 14. Risk Management/03 - Risk treatment options.mp4 9.5 MB
~Get Your Files Here !/07 - 6. Software Security Issues/04 - Request forgery.mp4 9.4 MB
猜你喜欢:
Vulnerability
Cybersecurity
CourseWikia
CySA
CS0
003
Management
CompTIA
com
Analyst
- 【影视】 Practical Cybersecurity for IT Professionals
-
收录时间:2023-12-17
文档个数:119
文档大小:392.7 MB
最近下载:2025-05-15
人气:384
磁力链接
[TutsNode.com] - Practical Cybersecurity for IT Professionals/04 - 3. Firewalls/03 - Advanced Windows Firewall.mp4 27.1 MB
[TutsNode.com] - Practical Cybersecurity for IT Professionals/05 - 4. Network Scanning/01 - Getting started with Nmap.mp4 22.0 MB
[TutsNode.com] - Practical Cybersecurity for IT Professionals/02 - 1. Why Cybersecurity/07 - Emerging trends in cybersecurity.mp4 20.4 MB
[TutsNode.com] - Practical Cybersecurity for IT Professionals/02 - 1. Why Cybersecurity/01 - A history of hackers.mp4 17.5 MB
[TutsNode.com] - Practical Cybersecurity for IT Professionals/04 - 3. Firewalls/05 - Introducing Linux iptables.mp4 16.1 MB
[TutsNode.com] - Practical Cybersecurity for IT Professionals/04 - 3. Firewalls/02 - Windows Firewall basics.mp4 14.5 MB
[TutsNode.com] - Practical Cybersecurity for IT Professionals/09 - 8. Network Protocols/02 - Capturing packets with Wireshark.mp4 14.3 MB
[TutsNode.com] - Practical Cybersecurity for IT Professionals/04 - 3. Firewalls/04 - ZedLan firewall log analyser.mp4 13.4 MB
[TutsNode.com] - Practical Cybersecurity for IT Professionals/02 - 1. Why Cybersecurity/04 - Common forms of cyberattack.mp4 13.1 MB
[TutsNode.com] - Practical Cybersecurity for IT Professionals/09 - 8. Network Protocols/03 - Making sense of the protocols.mp4 13.0 MB
[TutsNode.com] - Practical Cybersecurity for IT Professionals/02 - 1. Why Cybersecurity/02 - The cyber kill chain.mp4 12.0 MB
[TutsNode.com] - Practical Cybersecurity for IT Professionals/03 - 2. Antivirus/01 - Introducing Microsoft Defender Antivirus.mp4 11.7 MB
[TutsNode.com] - Practical Cybersecurity for IT Professionals/07 - 6. Vulnerability Scanning/01 - Preparing Nessus.mp4 10.5 MB
[TutsNode.com] - Practical Cybersecurity for IT Professionals/08 - 7. Web Applications/02 - Running an SQL injection attack.mp4 10.1 MB
[TutsNode.com] - Practical Cybersecurity for IT Professionals/05 - 4. Network Scanning/02 - Advanced Nmap options.mp4 10.0 MB
[TutsNode.com] - Practical Cybersecurity for IT Professionals/02 - 1. Why Cybersecurity/03 - Stuxnet and the kill chain.mp4 9.8 MB
[TutsNode.com] - Practical Cybersecurity for IT Professionals/03 - 2. Antivirus/02 - Detecting malware with Microsoft Defender.mp4 9.5 MB
[TutsNode.com] - Practical Cybersecurity for IT Professionals/04 - 3. Firewalls/06 - Setting up a simple iptables firewall.mp4 9.3 MB
[TutsNode.com] - Practical Cybersecurity for IT Professionals/06 - 5. Network Connections/02 - Transferring files using netcat.mp4 9.2 MB
[TutsNode.com] - Practical Cybersecurity for IT Professionals/06 - 5. Network Connections/04 - Setting up a netcat honeypot.mp4 8.9 MB
猜你喜欢:
Practical
Cybersecurity
Professionals